Sciweavers

CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
15 years 4 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
71
Voted
CRYPTO
1989
Springer
148views Cryptology» more  CRYPTO 1989»
15 years 4 months ago
A Certified Digital Signature
Ralph C. Merkle
75
Voted
CRYPTO
1989
Springer
99views Cryptology» more  CRYPTO 1989»
15 years 4 months ago
How to Explain Zero-Knowledge Protocols to Your Children
Jean-Jacques Quisquater, Myriam Quisquater, Muriel...
86
Voted
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
15 years 4 months ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
85
Voted
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 4 months ago
Efficient Identification Schemes Using Two Prover Interactive Proofs
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi ...
Cryptology
Top of PageReset Settings